{"id":16835,"date":"2019-11-07T14:10:05","date_gmt":"2019-11-07T22:10:05","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/11\/07\/news-10574\/"},"modified":"2019-11-07T14:10:05","modified_gmt":"2019-11-07T22:10:05","slug":"news-10574","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/11\/07\/news-10574\/","title":{"rendered":"Not us, YOU: vendor email compromise explained"},"content":{"rendered":"<p><strong>Credit to Author: Jovi Umawing| Date: Thu, 07 Nov 2019 21:49:16 +0000<\/strong><\/p>\n<p><a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.agari.com\/insights\/whitepapers\/silent-starling\/\" target=\"_blank\">Silent Starling<\/a>, an online organized criminal group hailing from West Africa, seem to have reminded SMBs and enterprises alike the perils of <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/glossary\/business-email-compromise-bec\/\" target=\"_blank\">business email compromise (BEC)<\/a> scams once more. This time, they&#8217;ve advanced BEC into a more potent modality by widening the scope of its potential targets and methodically preparing for the attack from timing to execution. Thus, vendor email compromise (VEC) is born.<\/p>\n<p>If you may recall, BEC is a form of targeted social engineering attack against institutions by baiting certain staff members\u2014usually a CFO or those in the finance, payroll, and human resource departments\u2014who either have access to company monetary accounts or the power to make financial decisions.<\/p>\n<p> A BEC campaign always starts off with an email, either <a href=\"https:\/\/blog.malwarebytes.com\/101\/2019\/02\/business-anti-phishing\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"phishing (opens in a new tab)\">phishing<\/a> or a spoofed email. Some BEC scams wants money from the get-go while others are more interested in sensitive information, such as W-2 forms.<\/p>\n<p> BEC is remarkably effective at ensnaring victims. Although it may seem like mere trickery, an impressive level of sophistication is actually put into these campaigns to succeed. In fact, a typical BEC campaign so closely follows <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/en.wikipedia.org\/wiki\/Kill_chain\" target=\"_blank\">the kill chain framework<\/a> used by <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/glossary\/advanced-persistent-threat-apt\/\" target=\"_blank\">advanced persistent threats (APTs)<\/a> that it is deemed APT-like. As such, BEC deserves attention worthy of an APT attack. <\/p>\n<p>So if BEC is already sophisticated enough to warrant APT-level protection, where does that leave businesses hit vendor email compromise?<\/p>\n<h3>BEC changed targets and gets a new name?<\/h3>\n<p>Before we launch into logistics of how to protect against VEC, let&#8217;s rewind and unpack naming conventions. <\/p>\n<p>It\u2019s true that scam campaigns change targets all the time and on occasion, in a heartbeat. But this particular scam evolution is quite unconventional because the amount of resources required to pull off a highly-successful VEC attack are easily quadruple that of a traditional BEC scam. To look at it another way, threat actors have introduced more friction into their operation instead of removing or minimizing it. However, they&#8217;ve also opened up the capacity to inflict far more damage to the target organization and to businesses worldwide.<\/p>\n<p>While a typical BEC campaign baits one staff member at-a-time to extract money from a targeted organization, a VEC scam doesn\u2019t go after a company for their money. Instead, VEC scammers look to leverage organizations against their own suppliers.<\/p>\n<p><a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.forbes.com\/sites\/jwebb\/2018\/02\/28\/how-many-suppliers-do-businesses-have-how-many-should-they-have\/#2dd574639bb7\" target=\"_blank\">It\u2019s typical for global brands to have hundreds of thousands of suppliers<\/a> around the world. Proctor &amp; Gamble, for example, has <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/news.pg.com\/press-release\/pg-corporate-announcements\/pg-recognizes-top-suppliers-powering-global-supply-network-\" target=\"_blank\">at least 50,000 company partners<\/a>. This translates to at least 50,000 potential victims if VEC scammers can get a foothold in Proctor &amp; Gamble&#8217;s systems. And these aren&#8217;t 50,000 individuals\u2014it&#8217;s 50,000 <em>organizations<\/em> open to compromise.<\/p>\n<p>This seems like a surefire money-making scheme, but it costs VEC scam operatives much more time and effort to sift through and study communication patterns based on thousands of current and archived email correspondences between the target business and their supply chain.<\/p>\n<h3>Okay, now I\u2019m listening. How does VEC work?<\/h3>\n<p>According to the Agari Cyber Intelligence Division (ACID), the cybersecurity bod that has been engaging with Silent Starling for a time and recently put out a dossier about the group, <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.prnewswire.com\/news-releases\/vendor-email-compromise-poses-significant-threat-to-companies-over-the-next-12-to-18-months-300950932.html\" target=\"_blank\">the VEC attack chain<\/a> this scam group follows is made up of three key phases.<\/p>\n<ul>\n<li><em>Intrusion.<\/em> This is where scammers attempt to compromise business email accounts of vendors in a variety of ways, such as phishing. Once successful, scammers move to phase two.<\/li>\n<li><em>Reconnaissance<\/em>. This is where scammers sit tight and go on \u201cactive waiting\u201d mode. While doing so, they gather intel by sifting through archived emails, which may number in the thousands, and create email forwarding and\/or redirect rules on the compromised accounts to have copies sent to email accounts the scammers control. They take note of dates so they know the timing, billing practices, the look of recognized official documents, or other information they can use for the success of the attack.<\/li>\n<li><em>Actions on objectives<\/em>. This is where they launch the VEC attack. The scammer\/impersonator makes sure that they are contacting the right person in the targeted supplier company; the email content they create has high fidelity, meaning that it closely resembles typical vendor wording and communication style; and the timing is as consistent as possible with previous correspondences. Doing these checks and balances make VEC exceedingly difficult to detect.<\/li>\n<\/ul>\n<p>We\u2019d like to add that reconnaissance also happens <em>before<\/em> the intrusion phase, in which VEC scammers gather intel on companies they want to target, particularly those whose accounts they can attempt to compromise.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" data-attachment-id=\"40950\" data-permalink=\"https:\/\/blog.malwarebytes.com\/business-2\/2019\/11\/not-us-you-vendor-email-compromise-explained\/attachment\/shutterstock_1276712677\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/shutterstock_1276712677.jpg\" data-orig-size=\"6250,3334\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;1&quot;}\" data-image-title=\"shutterstock_1276712677\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/shutterstock_1276712677-300x160.jpg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/shutterstock_1276712677-600x320.jpg\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/shutterstock_1276712677-600x320.jpg\" alt=\"\" class=\"wp-image-40950\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/shutterstock_1276712677-600x320.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/shutterstock_1276712677-300x160.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure>\n<\/div>\n<h3>How can business owners protect against VEC and BeC?<\/h3>\n<p>Business owners should address these types of online threats before they happen, while they are happening, and after they happen.<\/p>\n<h4>Before<\/h4>\n<p>Remember that scams\u2014these included\u2014target people. In particular, they take advantage of what your people don\u2019t know. That said, awareness of the existence of VEC, BEC, and other account takeover campaigns should be the first order of business. <\/p>\n<p>Organizations must ensure that all members of staff, from the newly-hired and contractual employee to the CEO, should at least have background knowledge on what these scams are, how they work, what the scam mails they use look like, who are the key persons in the company threat actors would target, and what these key persons can do if or when they ever receive is a suspicious email.  <\/p>\n<p>Furthermore, it pays to familiarize employees with proper business procedures on how funds and\/or sensitive information should be requested.<\/p>\n<p>Establishing policies and procedures for business conducted over email should be in place, if there aren&#8217;t already. Organizations can build these around the assumption that the requesting party is not who they are and that they must verify who they claim they are. Think of it as an internal two-step verification process. This can be as simple as calling the boss or supplier using their contact number in record or requiring another person to authorize the request.<\/p>\n<p>Also consider including a \u201cno last-minute urgent fund request\u201d from higher ups. If this is unavoidable for some reason, a rigorous verification process must be in place and upheld in the event of such a request. The higher up making the request must know the process and expect to undergo it.<\/p>\n<h4>During<\/h4>\n<p>It\u2019s possible for highly-sophisticated scams to tick all the verification boxes\u2014until they don\u2019t. Remember that in these particular scams, there will always be something different that will stand out. It could be the sender\u2019s name, signature, or the email address itself, but usually it\u2019s the sudden change in account details that raises the alarm. Heed this alarm and call the supplier or vendor making the financial request\u2014a video call would be ideal if possible\u2014to confirm once more if they have submitted the request.<\/p>\n<h4>After<\/h4>\n<p>In the event that fraud is discovered after the financial request is fulfilled, begin the recovery process right away. Call your bank and request that they talk to the bank where the transfer was sent. If your business is insured, call your insurers and company shareholders. Lastly, reach out to local law enforcement and the FBI.<\/p>\n<p>While things may be chaotic at this point, organizations must remember to document everything that has happened while gathering evidence. This is information that is not only essential during investigations but can also be used as material for training employees. It may not seem like it, but successful cyber and scam attacks are invaluable experiences organizations can learn from.<\/p>\n<p>Furthermore, assess if sensitive information has been stolen as well. If so, mitigate according to the type of information stolen so that it can never be used to harm the company, its assets, and its people.<\/p>\n<p>Lastly, if your company is not using one (or some) already, consider investing in security tools with advanced configuration options that could detect and nip BEC and VEC scams in the bud. Such technologies include email authentication technologies, like Sender Policy Framework (SPF), DomainKeys Identified Mail (DKIM), and Domain-based Message Authentication Reporting and Conformance (DMARC).<\/p>\n<p>Stay safe! <\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/business-2\/2019\/11\/not-us-you-vendor-email-compromise-explained\/\">Not us, YOU: vendor email compromise explained<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/business-2\/2019\/11\/not-us-you-vendor-email-compromise-explained\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Jovi Umawing| Date: Thu, 07 Nov 2019 21:49:16 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/business-2\/2019\/11\/not-us-you-vendor-email-compromise-explained\/' title='Not us, YOU: vendor email compromise explained'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/shutterstock_1229210977.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Vendor email compromise (VEC) is a new cybersecurity term for a familiar practice, taken to the thousandth degree. Learn the similarities with business email compromise and how your organization can protect against them both. <\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/business-2\/\" rel=\"category tag\">Business<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/account-takeover\/\" rel=\"tag\">account takeover<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/acid\/\" rel=\"tag\">ACID<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/agari\/\" rel=\"tag\">Agari<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/agari-cyber-intelligence-division\/\" rel=\"tag\">Agari Cyber Intelligence Division<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ato\/\" rel=\"tag\">ATO<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/bec\/\" rel=\"tag\">bec<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/business-cyberattacks\/\" rel=\"tag\">business cyberattacks<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/business-email-compromise\/\" rel=\"tag\">Business Email Compromise<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/business-threats\/\" rel=\"tag\">business threats<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/nigerian-scammer\/\" rel=\"tag\">Nigerian scammer<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/phishing\/\" rel=\"tag\">phishing<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/silent-starling\/\" rel=\"tag\">Silent Starling<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/social-engineering\/\" rel=\"tag\">Social Engineering<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/vec\/\" rel=\"tag\">VEC<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/vendor-email-compromise\/\" rel=\"tag\">vendor email compromise<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/business-2\/2019\/11\/not-us-you-vendor-email-compromise-explained\/' title='Not us, YOU: vendor email compromise explained'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/business-2\/2019\/11\/not-us-you-vendor-email-compromise-explained\/\">Not us, YOU: vendor email compromise explained<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[21453,8742,23398,23399,20186,14347,1001,23400,11140,21646,23401,3924,23402,10510,23403,23404],"class_list":["post-16835","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-account-takeover","tag-acid","tag-agari","tag-agari-cyber-intelligence-division","tag-ato","tag-bec","tag-business","tag-business-cyberattacks","tag-business-email-compromise","tag-business-threats","tag-nigerian-scammer","tag-phishing","tag-silent-starling","tag-social-engineering","tag-vec","tag-vendor-email-compromise"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16835","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16835"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16835\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16835"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16835"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16835"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}